Ads 468x60px

Saturday, August 17, 2013

Google dork Tool-Sql poizon tool

Sql poizon tool includes php, asp, rfi, lfi dorks. You can scan site by google dorks. And fix vulnerable sites. This software allows you to scan site based on country. After scan site you can crawl sites for checking vulnerability. You also can inject by this tools. Lets see screenshot of this tool:





2 comments:

  1. Replies
    1. You can play around with the tool and understand the function of it

      Delete

 

Is TOR Secure??

TOR is not safe to hack!! With putting too much security in middle, you increase the risk of malicious traffic from end station going undetected through this tight-secure loop. It’s a general rule when traffic moves from higher trust to lower trust , the nature of protection provided on either ends should be evaluated and should it match with the data classification level it carries with in. try using some other vpns!!In particular if somebody can observe your traffic and your target's traffic, he can correlate that.

One interesting variant is connecting to a VPN over TOR. That helps with 3), provided you trust the VPN, but you need to figure out a way to buy VPN access anonymously.

Factors Affecting Anonymity Online

IP address- can be resolved by VPN's. User agent- https://addons.mozilla.org/en-US/firefox/addon/user-agent-switcher/. MAC address - Technetium mac changer. For more information be have anonymous service online. Please visit http://prism-break.org/

Total Pageviews

Total Pageviews

Total Pageviews

Sample Text